Teacher Perspective on Internet Censorship in Turkey

Total Page:16

File Type:pdf, Size:1020Kb

Teacher Perspective on Internet Censorship in Turkey Universal Journal of Educational Research 6(2): 296-306, 2018 http://www.hrpub.org DOI: 10.13189/ujer.2018.060212 Teacher Perspective on Internet Censorship in Turkey Sayim Aktay Faculty of Education, Mugla Sitki Kocman University, Turkey Copyright©2018 by authors, all rights reserved. Authors agree that this article remains permanently open access under the terms of the Creative Commons Attribution License 4.0 International License Abstract There has been a rapid increase both in the the Internet have continued to increase in number with the number of users and the number of websites providing data improvement of the Internet. Some 19.7 thousand domain since the invention of Internet; it has become the richest names existed on the Internet in 1995. As of October 2016, and most used source of information. However, several recent estimations by Netcraft have revealed that there are countries, including Turkey, resort to censorship owing to 1.82 billion registered domain names [42, 43]. The Internet the fact that anybody can publish on the Internet with also has an increasing number of user groups. Based on sometimes undesirable content. The main purpose of this data from Internetworldstats.com, in 1995 just 16 million study is to reveal how primary and secondary school people—or 0.4% of world’s population—had Internet teachers approach Internet censorship in Turkey. The study access. As of September 2017 that number has was conducted with a voluntary group of 2015 primary exponentially increased to 3.88 billion people—accounting (855) and secondary (1160) school teachers who had social for 51.7% of the world’s population [27, 28]. Examining media accounts in Turkey during the 2013 – 2014 Internet statistics, it can be observed that Internet use is on academic year in the spring semester. In the study, a survey the rise both in terms of numbers and active domain names. was used. The study reveals that 59.4% of teachers think Internet censorship has posed social problems in various that it is necessary to resort censor the Internet from countries due in part to there being such a large user of undesirable content like sexuality and gambling. On the numbers worldwide. Thus, several issues have arisen other hand, the vast majority of the teachers (86.6%) do not pertaining authorization and authority in terms of who approve the blocking of websites as they can be used as an controls the Internet and who decides which content is educational tool. Moreover, 60.5% believe that blocking of allowed [10]. When looking at how censorship is applied, certain Internet websites will not negatively affect one can observe the use of partial censorship such the education. blocking of social media content (i.e. a user’s Twitter feed) alongside the complete blocking of websites [58]. When Keywords Internet Censorship, Primary Education, looking at the world on whole, many countries such as Secondary Education China [60, 6], Pakistan [40, 39], Iran [7], and Syria [13] apply Internet censorship. When examining reports produced by OpenNet Initiative, the number of countries that censor the Internet can be said to be over 80 [44]. Internet censorship is sometimes used by countries as a 1. Introduction means of preventing the general public from learning about their leaders’ errors [1]. In addition, while the censorship 1.1. The Internet and Internet Censorship may sometimes be perceived in terms of suppressing ideas of certain individuals, groups and government officers The Internet, which was created in 1969 by the United imposing the phenomena considered to be true and lawful States Ministry of Defense with the intent of developing a by the state may also be thought of as a necessity in order to system able to operate even in case of emergencies like protect children and moral values and improve society [1, nuclear strikes, has turned into a vast information network 25]. As an example, in some U.S. states content filtering interconnecting countries and computers that enterprises exists on public computers used in Internet cafes, schools, and individuals use for data exchange [24]. The Internet and libraries [61]. In the context of Internet censorship, has been improved and renewed in terms of both methods such as Boarder Gateway Protocol tampering, infrastructure and features over the years, and has become DNS tampering, and Packet filtering can be used to restrict more accessible to an ever increasing number of people certain content [18, 36]. The use of various censorship thanks to increasing bandwidth and reduced price [56]. methods can be seen today in countries such as Pakistan, The websites broadcasting and providing information on China, Quatar and the United Arab Emirates [38, 45]. In Universal Journal of Educational Research 6(2): 296-306, 2018 297 addition to state institutions, certain companies also censor restricted by any governmental body. In one study put their Internet. In one Italian study done involving 3G and together involving a total of 7,357 people from Hong 4G networks, a range of censorship of between 32.5% and Kong, India, Indonesia, Japan, South Korea, Malaysia, 99.5% was found [4]. Pakistan, Singapore, Taiwan, Thailand, and Vietnam, it’s Today, when certain states and institutions apply believed that some 78% of users wanted freedom of Internet censorship, people either change how they act expression, and approximately 90% of users felt that online or they try one of any number of ways to bypass the freedom of expression is a basic human right. However, censorship. In one study done, it was observed that people over two out of every three users expressed that Internet who were confronted with censored Internet content were censorship, too, is necessary. A large proportion of users either able to shift towards an alternative source, search for were furthermore of the opinion that censorship needs to other related content or, upon giving up, shift to doing be applied in situations such as pornography, gambling, another activity else entirely [31]. In study done involving and violation of rights [55]. 51 Pakistani university students, the students were observed using VPS, web proxy, Tor, and various other 1.3. The Internet from the Perspective of Education means to bypass the censorship [2]. In yet another study done involving 770 individuals in Pakistan, some 57% of The Internet is a substantial information-sharing tool people were observed using VPN programs to get around that enables people to communicate with each other via the censorship [31]. It’s been demonstrated that those who such means as e-mail and instant messaging. Add to that, manage to bypass the censorship first express the most all types of transactions from banking to shopping can be interest in blocked social media content [29]. However, done via it [26]. Today, the Internet also provides according to a study done by Callanan & Jerman-Blazic educational benefits like access to educational information, [12] involving 664 participants from 10 Asian and African online expertise, lesson plans, and teacher forums [8]. The countries, 34% of users confronting blocked content Internet’s becoming one of today’s most important experienced security problems. educational tools means that integrating it into teaching has also reached become of importance. Libraries, 1.2. Internet Censorship Studies educators, and institutions thus are trying hooking schools up to the Internet, whereby school programs and In some countries, people’s reaction towards Internet textbooks too are even becoming digitized [52]. censorship in terms of opinion differs towards the country The Internet today has become a key well of [19]. For example, upon asking Americans’ opinions on information for especially families, students, and teachers Internet censorship, some have stated that online content [51]. It also has plays a positive role in students’, teachers’ must be censored in order to achieve children safety, a administrators’, and families’ lives [5]; thus entailing that civilized society, national security, and creativity. On the a great amount of money is being invested worldwide by other hand, others have suggested that people must be able families and schools into Internet-based technology such to share their ideas in order to express themselves online as computers [57]. It appears that the Internet. It appears even if their ideas are controversial [62]. Similarly, in a that for students, the Internet is believed to play an 2005 study put forth by Hostway involving 2500 people, integral role as part of a modern education [50]. it was determined that bloggers need to be prohibited from When it comes to researching information, the Internet sharing people’s addresses and personal information has changed how young students gain access to online [32]. information by means of offering a number of advantages. In a 1994 – 1996 study of more than 15,000 participants One study done involving young pupils had revealed [11], 36% of those participants stated that Internet some 97% of students had obtained information via the censorship is the most prominent issue concerning the Internet rather than using the library [41]. Children today Internet. In a 1998 American study of 4247 people [17], are able to use the internet in order to browse the web, do 47% of participants indicated that certain types of homework, play games, follow social media, blog, listen information must not be allowed on the Internet, while 44% to music, interact via webcam, and venture through objected to Internet censorship. In a 2007 Australian study cyberspace [54]. of 17.881 people [59], 74% of the participants objected to Moreover, of what is censored automatically, an even government-imposed content filtering systems. In a greater proportion of content wanting to be censored but 2001-person Chinese study [34], more than 80% of the that can be incorrectly censored is educational content.
Recommended publications
  • THE BUSINESS of CENSORSHIP: CONTENT MANAGEMENT and the CHINESE ECONOMY By
    THE BUSINESS OF CENSORSHIP: CONTENT MANAGEMENT AND THE CHINESE ECONOMY by JOSHUA CLARK B.A. (Hons.), Queen's University at Kingston, 2009 MASTER OF ARTS in THE FACULTY OF GRADUATE STUDIES (Political Science) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) August 2010 ©Joshua Clark, 2010 Abstract Content control and censorship on the Internet are increasingly important topics for scholars of democratization, media and communications. Most studies have examined the relationship between the Internet, content management and various elements important to democratization such as the formation of civil society organizations. This thesis attempts to expand this discussion by examining the effects of online content management on economic systems, using the People's Republic of China as an example. China features a globally integrated economy that is increasing dependent on manufacturing and services while simultaneously maintaining one of the most extensive online content management systems in the world. This paper attempts to show how the Communist Party of China is able to reconcile the need for connectivity in order to drive their economy while maintaining political control. It also discusses the long-term implications of this strategy. The first section consists of a series of quantitative and qualitative tests to determine how various classes of websites are managed. These tests reveal that in order to maintain the flow of information necessary for a globally integrated economy, the Chinese Communist Party utilizes strategies that manage but not block the information flows related to business. This survey is followed by a case study examining the relationship between Google and China, and the implications of Chinese regulation and control for the broader economy.
    [Show full text]
  • 'It Existed Indeed … It Was All Over the Papers': Memories of Film
    . Volume 14, Issue 1 May 2017 ‘It existed indeed … it was all over the papers’: memories of film censorship in 1950s Italy Daniela Treveri Gennari, Oxford Brookes University, UK Silvia Dibeltulo, Oxford Brookes University, UK Abstract: Film censorship in post-war Italy has been widely researched by scholars from the perspective of governmental and religious interventions in the attempt to control the film industry and moralise its audiences. However, cinema audiences’ experiences of this practice have been virtually neglected. The Italian Cinema Audiences project – funded by the AHRC – has investigated how cinema figures in the memories of people’s daily lives throughout the 1950s, a time in which cinema-going was the most popular national pastime, representing at its peak 70% of leisure expenditure. The project unveiled how Italian audiences chose films, what genres and stars they preferred, and how region, location, gender, and class influenced their choices. One of the key questions explored in our study is how film spectators remember censorship. This article presents the findings of the analysis of video-interviews conducted across the country focussing on audiences’ memories and perceptions of film censorship in the period under scrutiny. Our analysis will investigate not only the actual recollections, but also how these individual narratives have been shaped by ‘inherited templates that individuals can use to interpret’ those experiences (Rigney, 2015: 67). Our oral history data will be presented against State and Catholic Church’s archival documents which will allow us to highlight the points of contacts and conflicts between official discourses and audience’s personal memories. Keywords: Film censorship, State, Church, collective memory, post-war Italy Page 235 Volume 14, Issue 1 May 2017 Introduction Film censorship in post-war Italy has been widely researched by film historians from the perspective of both governmental and religious interventions.
    [Show full text]
  • Can Self-Censorship in News Media Be Detected Algorithmically? A
    Can Self-Censorship in News Media be Detected Algorithmically? A Case Study in Latin America Rongrong Tao1, Baojian Zhou2, Feng Chen2, Naifeng Liu2, David Mares3, Patrick Butler1, Naren Ramakrishnan1 1 Discovery Analytics Center, Department of Computer Science, Virginia Tech, Arlington, VA, USA 2 Department of Computer Science, University at Albany, SUNY, Albany, NY, USA 3 University of California at San Diego, San Diego, CA, USA [email protected], {bzhou6, fchen5, nliu3}@albany.edu, [email protected] [email protected], [email protected] Abstract Censorship in social media has been well studied and pro- vides insight into how governments stifle freedom of expres- sion online. Comparatively less (or no) attention has been paid to detecting (self) censorship in traditional media (e.g., news) using social media as a bellweather. We present a novel unsupervised approach that views social media as a sensor to detect censorship in news media wherein statisti- cally significant differences between information published in the news media and the correlated information published in social media are automatically identified as candidate cen- Figure 1: Worldwide freedom of the press (2014). The higher the sored events. We develop a hypothesis testing framework score, the worse the press freedom status. to identify and evaluate censored clusters of keywords, and a new near-linear-time algorithm (called GraphDPD) to identify the highest scoring clusters as indicators of censor- Social media censorship often takes the form of active cen- ship. We outline extensive experiments on semi-synthetic sors identifying offending posts and deleting them and there- data as well as real datasets (with Twitter and local news fore tracking post deletions supports the use of supervised media) from Mexico and Venezuela, highlighting the capa- learning approaches [8, 4, 1, 11].
    [Show full text]
  • West Censoring East
    West Censoring East The Use of Western Technologies by Middle East Censors 2010-2011 Executive Summary The OpenNet Initiative has documented network filtering of the Internet by national governments in over forty countries worldwide. Countries use this network filtering as one of many methods to control the flow of online content that is objectionable to the filtering governments for social, political, and security reasons. Filtering is particularly appealing to governments as it allows them to control content not published within their national borders. National governments use a variety of technical means to filter the Internet; in this paper, we analyze the use of American- and Canadian- made software for the purpose of government-level filtering in the Middle East and North Africa. In this report, the authors find that nine countries in the region utilize Western-made tools for the purpose of blocking social and political content, effectively blocking a total of over 20 million Internet users from accessing such websites. 1 The authors analyze as well the increasing opacity of the usage of Western-made tools for filtering at the national level. Helmi Noman and Jillian C. York authored this report. ONI principal investigators Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain authored the foreword. Noman is a Senior Research Fellow at the Munk School of Global Affairs, University of Toronto, and is a Berkman Center Research Affiliate. York is the coordinator for the OpenNet Initiative at the Berkman Center for Internet & Society. The authors would like to thank James Tay of Citizen Lab for technical support and test data analysis.
    [Show full text]
  • Media Literacy Policy in Pakistan
    Hacettepe University Graduate School of Social Sciences Department of Communication Sciences MEDIA LITERACY POLICY IN PAKISTAN Sana ZAINAB Master Thesis Ankara, 2019 MEDIA LITERACY POLICY IN PAKISTAN Sana ZAINAB Hacettepe University Graduate School of Social Sciences Department of Communication Sciences Master Thesis Ankara, 2019 YAYIMLAMA VE FİKRİ MÜLKİYET HAKLARI BEYANI Enstitü tarafından onaylanan lisansüstü tezimin tamamını veya herhangi bir kısmını, basılı (kağıt) ve elektronik formatta arşivleme ve aşağıda verilen koşullarla kullanıma açma iznini Hacettepe Üniversitesine verdiğimi bildiririm. Bu izinle Üniversiteye verilen kullanım hakları dışındaki tüm fikri mülkiyet haklarım bende kalacak, tezimin tamamının ya da bir bölümünün gelecekteki çalışmalarda (makale, kitap, lisans ve patent vb.) kullanım hakları bana ait olacaktır. Tezin kendi orijinal çalışmam olduğunu, başkalarının haklarını ihlal etmediğimi ve tezimin tek yetkili sahibi olduğumu beyan ve taahhüt ederim. Tezimde yer alan telif hakkı bulunan ve sahiplerinden yazılı izin alınarak kullanılması zorunlu metinleri yazılı izin alınarak kullandığımı ve istenildiğinde suretlerini Üniversiteye teslim etmeyi taahhüt ederim. Yükseköğretim Kurulu tarafından yayınlanan “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” kapsamında tezim aşağıda belirtilen koşullar haricince YÖK Ulusal Tez Merkezi / H.Ü. Kütüphaneleri Açık Erişim Sisteminde erişime açılır. o Enstitü / Fakülte yönetim kurulu kararı ile tezimin erişime açılması mezuniyet
    [Show full text]
  • Iclab: a Global, Longitudinal Internet Censorship Measurement Platform
    ICLab: A Global, Longitudinal Internet Censorship Measurement Platform Arian Akhavan Niaki∗y Shinyoung Cho∗yz Zachary Weinberg∗x Nguyen Phong Hoangz Abbas Razaghpanahz Nicolas Christinx Phillipa Gilly yUniversity of Massachusetts, Amherst zStony Brook University xCarnegie Mellon University {arian, shicho, phillipa}@cs.umass.edu {shicho, nghoang, arazaghpanah}@cs.stonybrook.edu {zackw, nicolasc}@cmu.edu Abstract—Researchers have studied Internet censorship for remains elusive. We highlight three key challenges that must nearly as long as attempts to censor contents have taken place. be addressed to make progress in this space: Most studies have however been limited to a short period of time and/or a few countries; the few exceptions have traded off detail Challenge 1: Access to Vantage Points. With few ex- for breadth of coverage. Collecting enough data for a compre- ceptions,1 measuring Internet censorship requires access to hensive, global, longitudinal perspective remains challenging. “vantage point” hosts within the region of interest. In this work, we present ICLab, an Internet measurement The simplest way to obtain vantage points is to recruit platform specialized for censorship research. It achieves a new balance between breadth of coverage and detail of measurements, volunteers [37], [43], [73], [80]. Volunteers can run software by using commercial VPNs as vantage points distributed around that performs arbitrary network measurements from each the world. ICLab has been operated continuously since late vantage point, but recruiting more than a few volunteers per 2016. It can currently detect DNS manipulation and TCP packet country and retaining them for long periods is difficult. Further, injection, and overt “block pages” however they are delivered.
    [Show full text]
  • Everyone's Guide to Bypassing Internet Censorship
    EVERYONE’S GUIDE TO BY-PASSING INTERNET CENSORSHIP FOR CITIZENS WORLDWIDE A CIVISEC PROJECT The Citizen Lab The University of Toronto September, 2007 cover illustration by Jane Gowan Glossary page 4 Introduction page 5 Choosing Circumvention page 8 User self-assessment Provider self-assessment Technology page 17 Web-based Circumvention Systems Tunneling Software Anonymous Communications Systems Tricks of the trade page 28 Things to remember page 29 Further reading page 29 Circumvention Technologies Circumvention technologies are any tools, software, or methods used to bypass Inter- net filtering. These can range from complex computer programs to relatively simple manual steps, such as accessing a banned website stored on a search engine’s cache, instead of trying to access it directly. Circumvention Providers Circumvention providers install software on a computer in a non-filtered location and make connections to this computer available to those who access the Internet from a censored location. Circumvention providers can range from large commercial organi- zations offering circumvention services for a fee to individuals providing circumven- tion services for free. Circumvention Users Circumvention users are individuals who use circumvention technologies to bypass Internet content filtering. 4 Internet censorship, or content filtering, has become a major global problem. Whereas once it was assumed that states could not control Internet communications, according to research by the OpenNet Initiative (http://opennet.net) more than 25 countries now engage in Internet censorship practices. Those with the most pervasive filtering policies have been found to routinely block access to human rights organi- zations, news, blogs, and web services that challenge the status quo or are deemed threatening or undesirable.
    [Show full text]
  • The Internet Beyond Borderless Versus Balkanized
    POROUS TERRITORIES: THE INTERNET BEYOND BORDERLESS VERSUS BALKANIZED LUKE MUNN Western Sydney University (Australia) [email protected] Abstract: If the internet was once viewed as a borderless realm, critics now warn it is in danger of being “balkanized”, splintering into nationalized fragments. Certainly nation-states increasingly see the Internet as “their” internet, a national space to be regulated and actively shaped. The first half of this article charts the technologies that appear to place this vision within reach: data localization, internet shutdowns, and internet filtering. These moves promise to exert sovereign control, to make the inter- net an extension of national territory. Yet by drawing on two recent events in China, this article argues that these territories are messy and their borders are permeable. Pro-government activists jump across the firewall in order to attack individuals and organizations who threaten the stability and security of their motherland. Simultane- ously, individuals scale the firewall in order to question the party line and express solidarity with democratic movements, undermining the political and technical boundaries established by their nation. Internet architectures create a condition where territorialization is constantly being both amplified and undermined by “extra- territorial” activities. These practices demonstrate the everyday porosity of internet territories, providing a messier portrait that goes beyond the dichotomy of borderless vs balkanized. Keywords: territory, fragmentation, balkanization, internet, China. When nations speak of the internet today, they no longer use the language of the virtual, but of soil. At the dawn of the internet, cyberspace was framed as a new realm decoupled from the state. This digital sphere stretched across the globe, making it essentially ungovernable.
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • Data Localization Requirements Across Different Jurisdictions 70
    The Localisation Gambit Unpacking Policy Measures for Sovereign Control of Data in India 19th March, 2019 By ​Arindrajit Basu, Elonnai Hickok, and Aditya Singh Chawla Edited by ​Pranav M Bidare, Vipul Kharbanda, and Amber Sinha Research Assistance ​Anjanaa Aravindan The Centre for Internet and Society, India Acknowledgements 2 Executive Summary 3 Introduction 9 Methodology 10 Defining and Conceptualizing Sovereign Control of Data 11 Mapping of Current Policy Measures for Localization of Data in India 13 The Draft Personal Data Protection Bill, 2018 13 Draft E-commerce Policy (s) 17 RBI Notification on ‘Storage of Payment System Data’ 19 Draft E-Pharmacy Regulations 20 FDI Policy 2017 20 National Telecom M2M Roadmap 21 Unified Access License for Telecom 21 Companies Act, 2013 and Rules 21 The IRDAI (Outsourcing of Activities by Indian Insurers) Regulations, 2017 22 Guidelines on Contractual Terms Related to Cloud Services 22 Reflecting on Objectives, Challenges and Implications of National Control of Data 24 Enabling Innovation and Economic Growth 24 Enhancing National Security and Law Enforcement Access 34 Law Enforcement Access 34 Protecting Against Foreign Surveillance 36 Threat to fibre-optic cables 37 Widening Tax Base 40 Data Sovereignty and India’s Trade Commitments 41 A Survey of Stakeholder Responses 48 Data Localisation Around the World 49 Conclusions and Recommended Approaches 61 Annexure I 70 Mapping Data Localization Requirements Across Different Jurisdictions 70 Annexure 2 75 A survey of stakeholder responses 75 1 Acknowledgements The authors would like to thank Pranav MB, Vipul Kharbanda, Amber Sinha, and Saumyaa Naidu for their invaluable edits and comments on the draft.
    [Show full text]
  • Morten Gylling
    The Structure of Discourse A Corpus-Based Cross-Linguistic Study Gylling-Jørgensen, Morten Document Version Final published version Publication date: 2013 License CC BY-NC-ND Citation for published version (APA): Gylling-Jørgensen, M. (2013). The Structure of Discourse: A Corpus-Based Cross-Linguistic Study. Copenhagen Business School [Phd]. PhD series No. 38.2013 http://libsearch.cbs.dk/primo_library/libweb/action/dlDisplay.do?docId=CBS01000656121&vid=CBS&afterPDS=tr ue Link to publication in CBS Research Portal General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Take down policy If you believe that this document breaches copyright please contact us ([email protected]) providing details, and we will remove access to the work immediately and investigate your claim. Download date: 30. Sep. 2021 copenhagen business school of Discourse The Structure handelshøjskolen solbjerg plads 3 dk-2000 frederiksberg danmark www.cbs.dk The Structure of Discourse A Corpus-Based Cross-Linguistic Study Morten Gylling PhD Series 38-2013 ISSN 0906-6934 Print ISBN: 978-87-92977-88-5 LIMAC PhD School Online ISBN: 978-87-92977-89-2 Department of International Business Communication PhD Series 38-2013 The Structure of Discourse A Corpus-Based Cross-Linguistic Study Morten Gylling Supervisor: Iørn Korzen Ph.D. School LIMAC Programme in Language and Culture Copenhagen Business School Morten Gylling The Structure of Discourse A Corpus-Based Cross-Linguistic Study 1st edition 2013 PhD Series 38.2013 © The Author ISSN 0906-6934 Print ISBN: 978-87-92977-88-5 Online ISBN:978-87-92977-89-2 LIMAC PhD School is a cross disciplinary PhD School connected to research communities within the areas of Languages, Law, Informatics, Operations Management, Accounting, Communication and Cultural Studies.
    [Show full text]
  • CHRIS BRONK, Ph.D. 4403 Oak Forest Dr. Missouri City, TX 77459 W
    CHRIS BRONK, Ph.D. 4403 Oak Forest Dr. Missouri City, TX 77459 W: 713.743.5593 C: 832.729.6205 rcbronk <at> central.uh.edu http://www.uh.edu/technology/departments/ilt/people/faculty/?l=bronk&f=chris PROFESSIONAL EXPERIENCE UNIVERSITY OF HOUSTON, Houston, TX Associate Professor, Information Sciences Technology 2020 – Present Assistant Professor, Information & Logistics Technology 2014 – 2020 Program Coordinator, Cybersecurity 2021 – Present Associate Director, Center for Information Security Research and Education 2014 – Present Research Associate, Hobby School of Public Affairs 2018 – Present RICE UNIVERSITY, Houston, TX Director – Program on Energy and Cybersecurity, Center for Energy Studies 2013 – 2014 Fellow – Baker Institute for Public Policy 2006 – 2014 Adjunct Associate Professor – Department of Computer Science 2011 – Present Lecturer – Department of Computer Science 2007 – 2011 UNIVERSITY OF TORONTO, Toronto, ONT Senior Fellow in Cyber Geopolitics – Canada Ctr. for Security Studies 2012 – 2014 SYRACUSE UNIVERSITY, Syracuse, NY Senior Research Fellow – Dept. of Electrical & Computer Engineering 2010 U.S. DEPARTMENT OF STATE, Washington, D.C. Senior Advisor – Office of eDiplomacy 2009 – 2015 Foreign Service Officer 2002 – 2007 SYRACUSE LANGUAGE SYSTEMS, Syracuse, NY Technical Staff Coordinator/Software Developer 1995 – 2000 EDUCATION SYRACUSE UNIVERSITY MAXWELL SCHOOL, Syracuse, NY Ph.D. in Political Science, 2006 * Dissertation: In Confidence: Information Technology, Secrecy and the State. * Subfields: International Relations and Public Administration MA in Political Science, 2001 YONSEI UNIVERSITY, Seoul, S. Korea Coursework in Asian Studies and Korean, 2001 – 2002 UNIVERSITY OF WISCONSIN, Madison, WI BS in History, with distinction, 1995 OXFORD UNIVERSITY, Oxford, UK Coursework in International Politics and History, 1992 HONORS UNIVERSITY OF HOUSTON • College of Technology Faculty Award.
    [Show full text]